A key delivery method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the method including transmitting an item entitlement control message (iecm) including item control information, transmitting a stream entitlement control message (SECM) including stream control information, and combining at least part of the item control information and at least part of the stream control information to produce the first item control word. Related methods and apparatus are also disclosed.
|
1. A key delivery method for use in an encoded communications system in which a first plurality of encoded items comprising at least a first item encoded with a first item control word and a second item encoded with a second item control word is sent in a communication stream from a sender to a receiver, the method comprising:
transmitting a first item entitlement control message (iecm) comprising first item control information for controlling only the first item and a second iecm comprising second item control information for controlling only the second item; transmitting a stream entitlement control message (SECM) comprising stream control information for controlling more than one item; combining at least part of the first item control information and at least part of the stream control information to produce the first item control word; and combining at least part of the second item control information and at least part of the stream control information to produce the second item control word, wherein said transmitting-iecm step is performed before said transmitting-SECM step.
2. A method according to
performing at least one of the following: utilizing the first item control word to decode the first encoded item; and utilizing the second item control word to decode the second encoded item.
3. A method according to
the first item control information comprises a first item key, and the second item control information comprises a second item key, and the stream control information comprises a stream key, and the combining step comprises: computing the first item control word from the first item key and the stream key; and computing the second item control word from the second item key and the stream key.
4. A method according to
the first item control information comprises a first item seed, and the second item control information comprises a second item seed, the stream control information comprises a stream seed, and the combining step comprises: computing a first item key from the first item seed using an item key production function; computing a second item key from the second item seed using the item key production function; computing a stream key from the stream seed using a stream key production function; computing the first item control word from the first item key and the stream key; and computing the second item control word from the second item key and the stream key. 5. A method according to
determining whether the receiver is authorized to compute the first item key and computing the first item key only if the receiver is authorized to compute the item key, and the step of computing a second item key comprises: determining whether the receiver is authorized to compute the second item key and computing the second item key only if the receiver is authorized to compute the second item key.
6. A method according to
determining whether the receiver is authorized to compute the stream key and computing the stream key only if the receiver is authorized to compute the stream key.
7. A method according to
8. A method according to
said SECM comprises a second plurality of SECMs transmitted with an average inter-SECM delay, and each of said first plurality of encoded items is associated with one of the second plurality of SECMs, and the time duration of at least one of said first plurality of encoded items is less than the average inter-SECM delay.
9. A method according to
10. A method according to
11. A method according to
12. A method according to
13. A method according to
determining whether the receiver is entitled to purchase at least one of the first item and the second item based, at least in part, on the purchase access information.
14. A method according to
determining whether the receiver is entitled to access at least one of the first item and the second item based, at least in part, on the access information.
15. A method according to
16. A method according to
17. A method according to
18. A method according to
19. A method according to
the time duration of the first item and the time duration of the second item at least partially overlap.
|
The present invention relates to broadcast systems in general, and in particular to data broadcast systems, especially to systems providing Conditional Access services.
Systems for ensuring that, in a pay or subscription broadcast system, only those who have paid to receive broadcast content actually do receive the broadcast content are well-known in the art. Such systems, which often include many other features, are known as Conditional Access (CA) systems. Typically, pay broadcast systems generally broadcast encrypted material and utilize a CA system to deliver one or more appropriate decryption keys to authorized receivers only.
One CA system is described in U.S. Pat. Nos. 5,282,249 and 5,481,609, both to Cohen et al. The two Cohen et al. patents describe a scrambled television system. Scrambled television transmissions described in the Cohen et al. patents include both scrambled data representing television signals and coded control messages, also known in the art as ECMs. The ECMs of Cohen et al. include, in a coded form, data necessary for generating a control word (CW) which may be used to descramble the scrambled data representing television signals.
Data necessary for generating a control word is known in the prior art to take many different forms and may include, in general, at least any of the following: a control word; an encrypted control word which is intended to be decrypted before use; and a seed to a generating function such as, for example, a one-way function which generates the control word upon input of the seed. Throughout the present specification and claims the terms "control word generating information" and "CW generating information" are used interchangeably to designate data necessary for generating a control word in any appropriate form, as described above.
While the two patents to Cohen et al. describe an analog system, that is, a system in which analog television data streams are broadcast to television sets, it is appreciated that similar ECM methods may also be used for digital television data streams, it being appreciated that scrambling methods appropriate to digital data would be used in digital television data streams.
The system of Cohen et al. and other systems described in the art share a feature of broadcasting an ECM synchronous to, generally immediately before or in a data stream parallel to, the actual scrambled broadcast. Typically, such an ECM is valid for a brief duration, with a new ECM being broadcast, in synchrony with a scrambled broadcast scrambled according to a new key, a few seconds, such as 10 seconds, after the broadcast of the previous ECM. Some systems have been described in which a key is sent, whether by broadcasting or by other means such as by mail, with a lower frequency, even once a month. Such a system is described, for example, in U.S. Pat. Nos. 4,484,027 and Re 33,189 to Lee et al.
Patents describing systems related to encrypted broadcasting and/or key distribution in encrypted broadcasting systems include the following:
U.S. Pat. No. 4,228,321 to Flanagan describes a privacy transmission system with remote key control, in which key control signals are produced at the unscrambling location and are both used for unscrambling at that location and also transmitted to a scrambling location for use in scrambling.
U.S. Pat. No. 4,531,020 to Wechselberger et al describes a method for controlling the simultaneous broadcast of enciphered digital information signals, for example in a radio or television broadcast environment, to a plurality of subscribers using several levels of enciphering keys.
U.S. Pat. No. 4,531,021 to Bluestein et al describes enciphering digital information for transmission using a first key, common to all receivers, and a second key specific to one receiver of a small group of receivers.
U.S. Pat. No. 4,864,615 to Bennett et al describes a system for reproduction of secure keys by using distributed key generation data and a distributed encrypted prekey.
U.S. Pat. No. 4,866,770 to Seth-Smith et al describes a system for distributing video, audio, teletext, and data, in which system wide, individual decoder and group decoder control signals are transmitted as part of a composite signal. The group decoder control signal includes information relating to a group of decoders, while the individual decoder control signal includes information relating to the operation of individual decoders.
U.S. Pat. No. 4,944,006 to Citta et al describes a secure data packet transmission system utilizing a global encryption key as well as address keys for encrypting individually addressed bit packets.
U.S. Pat. No. 5,301,247 to Rasmussen et al. describes a method for ensuring secure communications, in which two keys are combined together to produce a session key.
U.S. Pat. No. 5,499,298 to Narasimhalu et al describes a method for controlled dissemination of digital information, in which encrypted digital information is decrypted by a tamper-proof controlled information access device, which access being provided according to conditions specified by an information provider.
In general, methods of transmitting a scrambled digital signal, including ECMs, are well known. Some systems use a composite signal, that is, an analog or digital signal including a plurality of components. Typically the plurality of components includes both a scrambled television signal component and an ECM component, the ECM component comprising a plurality of ECMs. Prior art references which discuss examples of this type of signal include the following: DVB ETR289, "Digital Video Broadcasting (DVB): Support for use of scrambling and conditional access (CA) within digital broadcasting systems"; and DVB SIM061, "Technical specification of DVB-Simulcrypt", Apr. 1, 1997.
Other documents relating to broadcasting of digital information include the DVB Specification for Data Broadcasting, document SI-DAT 360 (TM 1779), Feb. 12, 1997; and ATSC Digital Television Standard, document A54, October 1995 and subsequent editions.
Other methods of transmitting a scrambled digital signal, particularly useful in a case where the signal includes sub-signals encoded according to various different methods, are described in "Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications", DVB document A017, May 1996 and subsequent editions; and in "Common Interface Specification for Conditional Access and other Digital Video Broadcasting Decoder Applications", CENELEC EN50221:1997.
The disclosures of all references mentioned above and throughout the present specification are hereby incorporated herein by reference.
The present invention seeks to provide an improved method for delivering a control word or key relating to an item. The present method is particularly useful in cases where the item is relatively short in duration and is transmitted asynchronously relative to an ECM stream; that is, time synchronization of the item and an associated ECM in the ECM stream cannot be guaranteed, typically because of the short duration of the item. The present method is also particularly useful in cases where the number of items is very large, and it may be impractical to assign a separate ECM stream to each item.
Cases of the types referred to may occur particularly in a data broadcast network, where a defined data item, such as a computer program or a multimedia item, is broadcast to subscribers or customers who have subscribed to or are otherwise authorized to receive the item. An item of this type may be of relatively short duration, such as between a fraction of a second and a few seconds, and there may be a very large number of items,
Existing methods of sending an ECM stream synchronized with a data stream, such as a data stream comprising a television program, are inadequate to provide for control word or key delivery in the cases described above, since state of the art ECM delivery mechanisms are not able to provide synchronization to the sub-second level.
There is thus provided in accordance with a preferred embodiment of the present invention a key delivery method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the method including transmitting an item entitlement control message (IECM) including item control information, transmitting a stream entitlement control message (SECM) including stream control information, and combining at least part of the item control information and at least part of the stream control information to produce the first item control word.
Further in accordance with a preferred embodiment of the present invention the transmitting-IECM step is performed before the transmitting-SECM step.
Still further in accordance with a preferred embodiment of the present invention the transmitting-IECM step is performed simultaneously with the transmitting-SECM step.
Additionally in accordance with a preferred embodiment of the present invention the method also includes utilizing the first item control word to decode the at least one encoded item.
Moreover in accordance with a preferred embodiment of the present invention the item control information includes an item key, and the stream control information includes a stream key, and the combining step includes computing the first item control word from the item key and the stream key.
Further in accordance with a preferred embodiment of the present invention the item control information includes a first seed, and the stream control information includes a second seed, and the combining step includes computing an item key from the first seed using an item key production function, computing a stream key from the second seed using a stream key production function, and computing the first item control word from the item key and the stream key.
Still further in accordance with a preferred embodiment of the present invention the step of computing an item key includes determining whether the receiver is authorized to compute the item key and computing the item key only if the receiver is authorized to compute the item key.
Additionally in accordance with a preferred embodiment of the present invention the step of computing a stream key includes determining whether the receiver is authorized to compute the stream key and computing the stream key only if the receiver is authorized to compute the stream key.
Moreover in accordance with a preferred embodiment of the present invention the at least one encoded item is transmitted asynchronously to the SECM.
Further in accordance with a preferred embodiment of the present invention the at least one encoded item includes a first plurality of encoded items.
Still further in accordance with a preferred embodiment of the present invention each of the first plurality of encoded items has a time duration, and the SECM includes a second plurality of SECMs transmitted with an average inter-SECM delay, and each of the first plurality of encoded items is associated with one of the second plurality of SECMs, and the time duration of at least one of the first plurality of encoded items is less than the average inter-SECM delay.
Additionally in accordance with a preferred embodiment of the present invention more than one of the first plurality of encoded items is associated with at least one of the second plurality of SECMs.
Moreover in accordance with a preferred embodiment of the present invention the first plurality of encoded items includes at least a first encoded item and a second encoded item, and the first encoded item and the second encoded item are transmitted substantially simultaneously.
Further in accordance with a preferred embodiment of the present invention the at least one encoded item includes a plurality of encoded items including a second item encoded with a second item control word, the method also including transmitting a second SECM including second stream control information, and combining the item control information and the second stream control information to produce the second item control word.
Still further in accordance with a preferred embodiment of the present invention the item control information includes item purchase information.
Additionally in accordance with a preferred embodiment of the present invention the first stream control information includes item purchase information.
Moreover in accordance with a preferred embodiment of the present invention the second stream control information includes item purchase information.
Further in accordance with a preferred embodiment of the present invention the item purchase information includes item price information.
Still further in accordance with a preferred embodiment of the present invention the item purchase information includes purchase access information and the method includes determining whether the receiver is entitled to purchase the first item based, at least in part, on the purchase access information.
Additionally in accordance with a preferred embodiment of the present invention the item purchase information includes access information and the method includes determining whether the receiver is entitled to access the first item based, at least in part, on the access information.
Moreover in accordance with a preferred embodiment of the present invention the first item is broadcast to a plurality of item receivers including the receiver.
Further in accordance with a preferred embodiment of the present invention the step of transmitting an IECM includes broadcasting the IECM.
Still further in accordance with a preferred embodiment of the present invention the step of transmitting an SECM includes broadcasting the SECM.
There is also provided in accordance with another preferred embodiment of the present invention a key production method for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver and in which an item entitlement control message (IECM) including item control information and a stream entitlement control message (SECM) including stream control information are also sent from the sender to the receiver, the method including extracting at least part of the item control information from the IECM and at least part of the stream control information from the SECM, and combining the at least part of the item control information and the at least part of the stream control information to produce the first item control word.
There is also provided in accordance with another preferred embodiment of the present invention a key delivery subsystem for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver, the key delivery subsystem including an item entitlement control message (IECM) production unit operative to produce an IECM including item control information, a stream entitlement control message (SECM) production unit operative to produce a SECM including stream control information, transmitting apparatus receiving the IECM from the IECM production unit and the SECM from the SECM production unit and operative to transmit the IECM and the SECM to the receiver, and combining apparatus located at the receiver for combining at least part of the item control information and at least part of the stream control information to produce the first item control word.
There is also provided in accordance with another preferred embodiment of the present invention a key production subsystem for use in an encoded communications system in which at least one encoded item including a first item encoded with a first item control word is sent in a communication stream from a sender to a receiver and in which an item entitlement control message (IECM) including item control information and a stream entitlement control message (SECM) including stream control information are also sent from the sender to the receiver, the key production subsystem including a control information extractor for extracting at least part of the item control information from the IECM and at least part of the stream control information from the SECM, and control word production apparatus for combining the at least part of the item control information and the at least part of the stream control information to produce the first item control word.
The present invention will be understood and appreciated more fully from the following detailed description, taken in conjunction with the drawings in which:
Reference is now made to
The operation of the system of
The IECM stream 120 typically comprises a logical stream which is carried by any appropriate physical communications channel (not shown), such as, for example, any appropriate one or combination of the following, which are well known in the art: a cable transmission system; a satellite transmission system; a terrestrial transmission system; and a data network, such as a local area network (LAN), a wide area network (WAN), or another data network. Establishing a stream, particularly a CA stream for carrying ECMs, over a physical communication channel is well known in the art and is described, for example, in DVB ETR289, "Digital Video Broadcasting (DVB): Support for use of scrambling and conditional access (CA) within digital broadcasting systems", referred to above.
Reference is now additionally made to
The subscriber unit 110 is typically operative, upon receiving the IECM 130, to extract the item control information 140 therefrom, using methods which are well known in the art. The item control information 140 typically comprises information relating to access to an individual broadcast item to be broadcast at some time, whether in the past, in the present, or in the future. Preferably, the subscriber unit 110 includes an ECM interpretation unit 145 which is operative to extract a first key Ski from the IECM 130, typically according to a first generator function f1, such that:
where IECMi represents the IECM 130, taken to be the ith from a plurality of IECMs. The ECM interpretation unit 145 may comprise a control information extractor (not shown) and control word production apparatus (not shown) each of which perform part of the function of the ECM interpretation unit 145 as described herein, but combination of these functions into a single unit 145 is believed to be preferable and only the ECM interpretation unit 145 is described herein for simplicity of description.
The first generator function f1 may comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art.
The item control information 140 typically also comprises other information relating to access to an individual broadcast item to be broadcast at some time, whether in the past, in the present, or in the future. Such other information may be similar to information typically included in prior art ECMs, and may include, without limiting the generality of the foregoing, one or more of the following: information defining which recipients may receive the individual broadcast item; one or more prices associated with the individual broadcast item; information defining which recipients may purchase the individual broadcast item; information defining which price a given recipient must pay to purchase the individual broadcast item; and geographic information defining regions within which the individual broadcast item may be received and/or purchased. Preferably, the subscriber unit 110 processes the IECM 130 in accordance with such other information, if present, so that, for example, no further processing is typically performed if the subscriber unit 110 is not authorized to receive the associated individual broadcast item. Similar processing, in the case of prior art ECMs, of such other information is well known in the art.
The headend 100 is also preferably operative to establish other streams, such as, for example, at least one ECM stream 150 and at least one service stream 160, for transmitting from the headend 100 to the subscriber unit 110.
The service stream 160 is typically operative to carry a plurality of items 170, each of the plurality of items 170 being encoded according to a control word. Typically, each one of the control words associated with each one of the plurality of items 170 is different from every other one of the control words.
Reference is now additionally made to
Referring back to
The ECM stream 150 is typically operative to carry a plurality of stream ECMs 180 including a stream ECMs 185. The stream ECMs 185 is associated with the itemi 175, using appropriate methods well known in the art. The stream ECMs 185 may typically also be associated with at least one other of the plurality of items 170, because the items 175 is typically relatively short in duration and is transmitted asynchronously relative to an ECM stream. It is appreciated that, in the implementation of
Reference is now additionally made to
The subscriber unit 110 is typically operative, upon receiving the stream ECMS 185, to extract the stream control information 186 therefrom, using methods which are well known in the art. The stream control information 186 typically comprises information relating to access to a stream comprising a plurality of broadcast items, as explained above. Preferably, the subscriber unit 110 includes an ECM interpretation unit 145, as described above, which is operative to extract a stream control word CWS from the stream ECMS 185, typically according to a second generator function f2, such that:
The second generator function f2 may be equivalent to the first generator function f1 or may alternatively comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art.
The ECM interpretation unit 145 is then preferably operable to compute an item control word for the itemi 175, typically according to a third generator function f3, such that:
CWi=f3 (SKi, CWs)
The third generator function f3 may be equivalent to the first generator function f1 or to the second generator function f2 or may alternatively comprise any appropriate function such as, for example, a decryption function or a one-way function such as a hash function, as are well known in the art. It is appreciated that in a simulcrypt environment as described, for example, in DVB SIM061, "Technical specification of DVB-Simulcrypt", referred to above in the Background of the Invention, the third generator function f3 will typically be shared among different encryption methods which make up the simulcrypt multiple encryption scheme.
It is appreciated that access to the itemi 175 may thus be controlled by access information in any one or combination of the IECM 130 or the stream ECMs 185, possibly in combination with other access information (not shown) as is well known in the art.
Reference is now made to
When an IECM is received by a subscriber unit (step 190), the subscriber unit extracts item control information relating to a future broadcast item from the IECM, typically using a first generator function (step 200).
When a stream ECM including broadcast control information for the broadcast item is received (step 210), stream control information is extracted from the stream ECM, typically using a second generator function (step 220).
The item control information and the stream control information are combined, typically using a third generator function, to produce a control word for descrambling the broadcast item (step 230).
Reference is now made to
The headend 100 also comprises transmitting apparatus 260, which may comprise any suitable transmitting apparatus. The transmitting apparatus 260 receives one or more IECMs from the IECM production unit 240 and/or one or more SECMs from the SECM production unit 250 and is preferably operative to transmit the IECMs and/or SECMs to the subscriber unit 110 (not shown in FIG. 4).
It is appreciated that the headend 100 typically also comprises many other conventional elements well known in the art.
It is appreciated that various features of the invention which are, for clarity, described in the contexts of separate embodiments may also be provided in combination in a single embodiment. Conversely, various features of the invention which are, for brevity, described in the context of a single embodiment may also be provided separately or in any suitable subcombination.
It will be appreciated by persons skilled in the art that the present invention is not limited by what has been particularly shown and described hereinabove. Rather the scope of the invention is defined only by the claims which follow.
Sered, Yishai, Dallard, Nigel Stephen
Patent | Priority | Assignee | Title |
10102648, | Dec 12 2011 | GOOGLE LLC | Browser/web apps access to secure surface |
10212460, | Dec 12 2011 | GOOGLE LLC | Method for reducing time to first frame/seek frame of protected digital content streams |
10452759, | Dec 12 2011 | GOOGLE LLC | Method and apparatus for protection of media objects including HTML |
10572633, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for instantiating plugin from within browser |
10691778, | Sep 24 2004 | GOOGLE LLC | Method and system for providing secure codecs |
6912513, | Oct 29 1999 | Sony Corporation; Sony Electronics Inc. | Copy-protecting management using a user scrambling key |
6965993, | Nov 09 1999 | GOOGLE LLC | Process and streaming server for encrypting a data stream |
7007170, | Mar 18 2003 | GOOGLE LLC | System, method, and apparatus for securely providing content viewable on a secure device |
7039938, | Jan 02 2002 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION | Selective encryption for video on demand |
7043473, | Nov 22 2000 | GOOGLE LLC | Media tracking system and method |
7120250, | Sep 09 2002 | Sony Corporation; Sony Electronics INC | Content distribution for multiple digital rights management |
7124303, | Jun 06 2001 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION | Elementary stream partial encryption |
7127619, | Jun 06 2001 | Sony Corporation; Sony Electronics INC | Decoding and decryption of partially encrypted information |
7150045, | Dec 14 2000 | GOOGLE LLC | Method and apparatus for protection of electronic media |
7151833, | Sep 09 2002 | Sony Corporation; Sony Electronics | Selective encryption to enable trick play |
7155012, | Jan 02 2002 | Sony Corporation; Sony Electronics Inc. | Slice mask and moat pattern partial encryption |
7155611, | Dec 22 1999 | IRDETO B V | Method of operating a conditional access system for broadcast applications |
7165175, | Sep 06 2000 | GOOGLE LLC | Apparatus, system and method for selectively encrypting different portions of data sent over a network |
7215770, | Jan 02 2002 | Sony Corporation; Sony Electronics, INC | System and method for partially encrypted multimedia stream |
7218738, | Jan 02 2002 | Sony Corporation; Sony Electronics Inc. | Encryption and content control in a digital broadcast system |
7225164, | Feb 15 2000 | Sony Corporation; SONY ELECTRONIS, INC | Method and apparatus for implementing revocation in broadcast networks |
7233669, | Jan 02 2002 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC A DELAWARE CORPORATION | Selective encryption to enable multiple decryption keys |
7242773, | Sep 09 2002 | Sony Corporation; Sony Electronics Inc. | Multiple partial encryption using retuning |
7263187, | Oct 31 2003 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A DELAWARE CORPORATION | Batch mode session-based encryption of video on demand content |
7286667, | Sep 15 2003 | Sony Corporation; Sony Electronics Inc. | Decryption system |
7287168, | Jun 06 2001 | Sony Corporation; Sony Electronics Inc. | Partial encryption and PID mapping |
7292691, | Jan 02 2002 | Sony Corporation; Sony Electronics Inc. | Progressive video refresh slice detection |
7292692, | Mar 25 2003 | Sony Corporation; Sony Electronics INC | Content scrambling with minimal impact on legacy devices |
7299292, | Mar 29 2002 | GOOGLE LLC | Process and streaming server for encrypting a data stream to a virtual smart card client system |
7302058, | Mar 30 1999 | Sony Corporation; Sony Electronics Inc. | Method and apparatus for securing control words |
7302059, | Jan 02 2002 | Sony Corporation; Sony Electronics Inc. | Star pattern partial encryption |
7328345, | Jan 29 2002 | GOOGLE LLC | Method and system for end to end securing of content for video on demand |
7336787, | Jun 06 2001 | Sony Corporation, a Japanese corporation; SONY ELECTRONICS INC , A CORP OF DELAWARE | Critical packet partial encryption |
7343013, | Dec 16 2003 | SONY CORPOARTION, A JAPANESE CORPORATION; Sony Electronics INC | Composite session-based encryption of video on demand content |
7346163, | Oct 31 2003 | Sony Corporation; Sony Electronics INC | Dynamic composition of pre-encrypted video on demand content |
7350082, | Jun 06 2001 | Sony Corporation; Sony Electronics Inc. | Upgrading of encryption |
7356143, | Mar 18 2003 | GOOGLE LLC | System, method, and apparatus for securely providing content viewable on a secure device |
7370342, | Jun 12 1998 | THOMSON LICENSING, S A S | Method and apparatus for delivery of targeted video programming |
7376233, | Jan 02 2002 | Sony Corporation; Sony Electronics Inc. | Video slice and active region based multiple partial encryption |
7376831, | Sep 06 2000 | GOOGLE LLC | Selectively encrypting different portions of data sent over a network |
7380117, | Nov 09 1999 | GOOGLE LLC | Process and streaming server for encrypting a data stream |
7406174, | Oct 21 2003 | GOOGLE LLC | System and method for n-dimensional encryption |
7508942, | Nov 05 2002 | Sony Corporation; Sony Electronics Inc. | Multi-process descrambler |
7530084, | May 28 2002 | Sony Corporation; Sony Electronics Inc.; Sony Corporation of America; Sony Electronics INC | Method and apparatus for synchronizing dynamic graphics |
7555464, | Mar 01 2006 | Sony Corporation; Sony Electronics Inc. | Multiple DRM management |
7565546, | Mar 30 1999 | Sony Corporation; Sony Electronics Inc.; Sony Electronics INC | System, method and apparatus for secure digital content transmission |
7567939, | Feb 15 2000 | Sony Corporation; Sony Electronics Inc. | Method and apparatus for implementing revocation in broadcast networks |
7594271, | Sep 20 2002 | GOOGLE LLC | Method and system for real-time tamper evidence gathering for software |
7620180, | Nov 03 2003 | Sony Corporation; Sony Electronics INC | Preparation of content for multiple conditional access methods in video on demand |
7623662, | Nov 03 2003 | Sony Corporation; Sony Electronics INC | Default encryption and decryption |
7640435, | Mar 18 2003 | GOOGLE LLC | System, method, and apparatus for securely providing content viewable on a secure device |
7702589, | Nov 09 1999 | Sony Corporation; Sony Electronics Inc. | Method for simulcrypting scrambled data to a plurality of conditional access devices |
7711115, | Nov 05 2002 | Sony Corporation; Sony Electronics Inc. | Descrambler |
7724907, | Nov 05 2002 | Sony Corporation; Sony Electronics Inc. | Mechanism for protecting the transfer of digital content |
7730300, | Mar 30 1999 | Sony Corporation; Sony Electronics Inc.; Sony Electronics INC | Method and apparatus for protecting the transfer of data |
7747853, | Jun 06 2001 | Sony Corporation; Sony Electronics Inc.; Sony Electronics INC | IP delivery of secure digital content |
7751560, | Jun 06 2001 | Sony Corporation; Sony Electronics Inc. | Time division partial encryption |
7765567, | Jan 02 2002 | Sony Corporation; Sony Electronics INC | Content replacement by PID mapping |
7817608, | Sep 23 2005 | GOOGLE LLC | Transitioning to secure IP communications for encoding, encapsulating, and encrypting data |
7823174, | Jan 02 2002 | Sony Corporation; Sony Electronics INC | Macro-block based content replacement by PID mapping |
7853980, | Oct 31 2003 | Sony Corporation; Sony Electronics Inc. | Bi-directional indices for trick mode video-on-demand |
7895616, | Jun 06 2001 | Sony Corporation; Sony Electronics Inc. | Reconstitution of program streams split across multiple packet identifiers |
7895617, | Dec 15 2004 | Sony Corporation; Sony Electronics Inc. | Content substitution editor |
7925016, | Mar 30 1999 | Sony Corporation; Sony Electronics Inc. | Method and apparatus for descrambling content |
8041190, | Dec 15 2004 | Sony Corporation; Sony Electronics Inc. | System and method for the creation, synchronization and delivery of alternate content |
8055894, | Nov 09 1999 | GOOGLE LLC | Process and streaming server for encrypting a data stream with bandwidth based variation |
8065733, | Sep 23 2005 | GOOGLE LLC | Method for evolving detectors to detect malign behavior in an artificial immune system |
8087051, | Jun 30 2000 | THOMSON LICENSING, S A S | Database management system and method for electronic program guide and television channel lineup organization |
8185921, | Feb 28 2006 | Sony Corporation; Sony Electronics Inc. | Parental control of displayed content using closed captioning |
8204220, | Sep 18 2008 | Sony Corporation; Sony Electronics Inc. | Simulcrypt key sharing with hashed keys |
8243924, | Jun 29 2007 | GOOGLE LLC | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
8259940, | May 28 2004 | VIACCESS | Method for broadcasting digital data to a targeted set of reception terminals |
8302127, | Sep 25 2000 | THOMSON LICENSING, S A S | System and method for personalized TV |
8351763, | Jun 12 1998 | THOMSON LICENSING, S A S | Television program recording with user preference determination |
8351765, | Jun 12 1998 | THOMSON LICENSING, S A S | Television program recording with user preference determination |
8352984, | Jun 12 1998 | THOMSON LICENSING, S A S | System and method for generating and managing user preference information for scheduled and stored television programs |
8386771, | Nov 09 1999 | GOOGLE LLC | Process and streaming server for encrypting a data stream with bandwidth based variation |
8396221, | Dec 21 2006 | Oracle International Corporation | Secure broadcasting and multicasting |
8488788, | Nov 09 1999 | Sony Corporation; Sony Electronics Inc. | Method for simulcrypting scrambled data to a plurality of conditional access devices |
8526612, | Jan 06 2006 | GOOGLE LLC | Selective and persistent application level encryption for video provided to a client |
8532075, | Sep 23 2005 | GOOGLE LLC | Transitioning to secure IP communications for encoding, encapsulating, and encrypting data |
8538892, | Jun 21 2001 | THOMSON LICENSING, S A S | Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure |
8572408, | Nov 05 2002 | Sony Corporation; Sony Electronics Inc. | Digital rights management of a digital device |
8621093, | May 21 2007 | GOOGLE LLC | Non-blocking of head end initiated revocation and delivery of entitlements non-addressable digital media network |
8621631, | Sep 23 2005 | GOOGLE LLC | Method for evolving detectors to detect malign behavior in an artificial immune system |
8640249, | Oct 13 2005 | Samsung Electronics Co., Ltd | Digital broadcasting conditional access system and method |
8645988, | Dec 13 2002 | Sony Corporation; Sony Electronics INC | Content personalization for digital content |
8667525, | Dec 13 2002 | Sony Corporation; Sony Electronics Inc. | Targeted advertisement selection from a digital stream |
8683218, | Oct 21 2003 | GOOGLE LLC | System and method for N-dimensional encryption |
8689016, | Dec 02 2005 | GOOGLE LLC | Tamper prevention and detection for video provided over a network to a client |
8751800, | Dec 12 2011 | GOOGLE LLC | DRM provider interoperability |
8752194, | Jun 29 2007 | GOOGLE LLC | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
8767966, | Dec 21 2006 | Oracle International Corporation | Secure broadcasting and multicasting |
8818871, | Jun 21 2001 | THOMSON LICENSING, S A S | Method and system for electronic purchases using an intelligent data carrier medium, electronic coupon system, and interactive TV infrastructure |
8818896, | Sep 09 2002 | Sony Corporation; Sony Electronics Inc. | Selective encryption with coverage encryption |
8855110, | Sep 04 2006 | XUESHAN TECHNOLOGIES INC | Personal video recorder having improved data access and method thereof |
8868464, | Feb 07 2008 | GOOGLE LLC | Preventing unauthorized modification or skipping of viewing of advertisements within content |
8891765, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for content decryption module |
8938758, | Sep 25 2000 | THOMSON LICENSING, S A S | System and method for personalized TV |
8984285, | Dec 12 2011 | GOOGLE LLC | Use of generic (browser) encryption API to do key exchange (for media files and player) |
9003558, | Dec 12 2011 | GOOGLE LLC | Allowing degraded play of protected content using scalable codecs when key/license is not obtained |
9038147, | Jun 29 2007 | GOOGLE LLC | Progressive download or streaming of digital media securely through a localized container and communication protocol proxy |
9110902, | Dec 12 2011 | GOOGLE LLC | Application-driven playback of offline encrypted content with unaware DRM module |
9129092, | Dec 12 2011 | Google Inc. | Detecting supported digital rights management configurations on a client device |
9183405, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for content protection for HTML media elements |
9223988, | Dec 12 2011 | GOOGLE LLC | Extending browser functionality with dynamic on-the-fly downloading of untrusted browser components |
9239912, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for content protection using authentication data |
9305590, | Oct 16 2007 | Seagate Technology LLC | Prevent data storage device circuitry swap |
9311459, | Dec 12 2011 | GOOGLE LLC | Application-driven playback of offline encrypted content with unaware DRM module |
9326012, | Dec 12 2011 | GOOGLE LLC | Dynamically changing stream quality when user is unlikely to notice to conserve resources |
9338405, | May 04 2006 | SYNAMEDIA LIMITED | Scrambled digital data item |
9542368, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for instantiating plugin from within browser |
9609279, | Sep 24 2004 | GOOGLE LLC | Method and system for providing secure CODECS |
9679602, | Jun 14 2006 | Seagate Technology LLC | Disc drive circuitry swap |
9686234, | Dec 12 2011 | GOOGLE LLC | Dynamically changing stream quality of protected content based on a determined change in a platform trust |
9697185, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for protection of media objects from the web application environment |
9697363, | Dec 12 2011 | GOOGLE LLC | Reducing time to first encrypted frame in a content stream |
9697366, | Dec 12 2011 | GOOGLE LLC | Use of generic (browser) encryption API to do key exchange (for media files and player) |
9713070, | Aug 18 2016 | Cisco Technology, Inc.; Cisco Technology, Inc | Regional conditional access |
9781478, | Sep 25 2000 | INTERDIGITAL CE PATENT HOLDINGS | System and method for personalized TV |
9785759, | Dec 12 2011 | GOOGLE LLC | Method, manufacture, and apparatus for configuring multiple content protection systems |
9875363, | Dec 12 2011 | GOOGLE LLC | Use of generic (browser) encryption API to do key exchange (for media files and player) |
Patent | Priority | Assignee | Title |
4228321, | May 16 1978 | Bell Telephone Laboratories, Incorporated | Privacy transmission system with remote key control |
4484027, | Nov 19 1981 | Comsat Corporation | Security system for SSTV encryption |
4531020, | Jul 23 1982 | TV COM INTERNATIONAL, INC | Multi-layer encryption system for the broadcast of encrypted information |
4531021, | Jun 19 1980 | TV COM INTERNATIONAL, INC | Two level encripting of RF signals |
4864615, | May 27 1988 | GENERAL INSTRUMENT CORPORATION GIC-4 | Reproduction of secure keys by using distributed key generation data |
4866770, | Jul 08 1986 | Scientific Atlanta, Inc. | Method and apparatus for communication of video, audio, teletext, and data to groups of decoders in a communication system |
4944006, | Mar 12 1987 | Zenith Electronics Corporation | Secure data packet transmission system and method |
5208856, | Dec 23 1988 | Laboratoire Europeen de Recherches Electroniques Avancees | Scrambling and unscrambling method for composite video signals and implementing device |
5282249, | Nov 14 1989 | Cisco Technology, Inc | System for controlling access to broadcast transmissions |
5301247, | Jul 23 1992 | Crest Industries, Inc. | Method for ensuring secure communications |
5481609, | Nov 09 1990 | Cisco Technology, Inc | System for controlling access to broadcast transmissions |
5499298, | Mar 17 1994 | Kent Ridge Digital Labs | Controlled dissemination of digital information |
5825876, | Dec 04 1995 | RPX CLEARINGHOUSE LLC | Time based availability to content of a storage medium |
5852664, | Jul 10 1995 | HEATHWAY HOLDINGS, LLC | Decode access control for encoded multimedia signals |
5991400, | Oct 31 1995 | U S PHILIPS CORPORATION | Time-shifted conditional access |
6069956, | Dec 15 1995 | Hitachi, LTD | Method and apparatus for encrypting multiplexed data streams using key information continued in streams |
6178242, | Feb 07 1997 | SYNAMEDIA LIMITED | Digital recording protection system |
EP375539, | |||
EP461029, | |||
RE33189, | May 09 1988 | Comsat Corporation | Security system for SSTV encryption |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Feb 04 1999 | NDS Ltd. | (assignment on the face of the patent) | / | |||
Jun 20 1999 | SERED, YISHAI | NDS Ltd | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 010818 | /0077 | |
Jun 24 1999 | DALLARD, NIGEL STEPHEN | NDS Ltd | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 010818 | /0077 | |
Apr 28 2009 | News Datacom Limited | NDS HOLDCO, INC | SECURITY AGREEMENT | 022703 | /0071 | |
Apr 28 2009 | NDS Limited | NDS HOLDCO, INC | SECURITY AGREEMENT | 022703 | /0071 | |
Apr 28 2009 | News Datacom Limited | J P MORGAN EUROPE LIMITED | SECURITY AGREEMENT | 022678 | /0712 | |
Apr 28 2009 | NDS Limited | J P MORGAN EUROPE LIMITED | SECURITY AGREEMENT | 022678 | /0712 | |
Mar 10 2011 | J P MORGAN EUROPE LIMITED | News Datacom Limited | RELEASE OF PATENT SECURITY INTERESTS | 026042 | /0124 | |
Mar 10 2011 | J P MORGAN EUROPE LIMITED | NDS Limited | RELEASE OF PATENT SECURITY INTERESTS | 026042 | /0124 | |
Mar 10 2011 | NDS HOLDCO, INC | News Datacom Limited | RELEASE OF INTELLECTUAL PROPERTY SECURITY INTERESTS | 025940 | /0710 | |
Mar 10 2011 | NDS HOLDCO, INC | NDS Limited | RELEASE OF INTELLECTUAL PROPERTY SECURITY INTERESTS | 025940 | /0710 | |
Mar 14 2013 | NDS Limited | Cisco Technology, Inc | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 030258 | /0465 | |
Oct 28 2018 | CISCO SYSTEMS INTERNATIONAL S A R L | NDS Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 047420 | /0600 | |
Oct 28 2018 | Cisco Technology, Inc | NDS Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 047420 | /0600 | |
Oct 28 2018 | CISCO VIDEO TECHNOLOGIES FRANCE | NDS Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 047420 | /0600 | |
Oct 28 2018 | BEAUMARIS NETWORKS LLC | NDS Limited | ASSIGNMENT OF ASSIGNORS INTEREST SEE DOCUMENT FOR DETAILS | 047420 | /0600 | |
Nov 08 2018 | NDS Limited | SYNAMEDIA LIMITED | CORRECTIVE ASSIGNMENT TO CORRECT THE 26 APPLICATION NUMBERS ERRONEOUSLY RECORDED AGAINST ON THE ATTACHED LIST PREVIOUSLY RECORDED AT REEL: 048513 FRAME: 0297 ASSIGNOR S HEREBY CONFIRMS THE CHANGE OF NAME | 056623 | /0708 | |
Nov 08 2018 | NDS Limited | SYNAMEDIA LIMITED | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 048513 | /0297 |
Date | Maintenance Fee Events |
Jan 02 2007 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Jan 03 2011 | M1552: Payment of Maintenance Fee, 8th Year, Large Entity. |
Jan 01 2015 | M1553: Payment of Maintenance Fee, 12th Year, Large Entity. |
Date | Maintenance Schedule |
Jul 01 2006 | 4 years fee payment window open |
Jan 01 2007 | 6 months grace period start (w surcharge) |
Jul 01 2007 | patent expiry (for year 4) |
Jul 01 2009 | 2 years to revive unintentionally abandoned end. (for year 4) |
Jul 01 2010 | 8 years fee payment window open |
Jan 01 2011 | 6 months grace period start (w surcharge) |
Jul 01 2011 | patent expiry (for year 8) |
Jul 01 2013 | 2 years to revive unintentionally abandoned end. (for year 8) |
Jul 01 2014 | 12 years fee payment window open |
Jan 01 2015 | 6 months grace period start (w surcharge) |
Jul 01 2015 | patent expiry (for year 12) |
Jul 01 2017 | 2 years to revive unintentionally abandoned end. (for year 12) |